Extraction and Categorisation of User Activity from Windows Restore Points
نویسندگان
چکیده
The extraction of the user activity is one of the main goals in the analysis of digital evidence. In this paper we present a methodology for extracting this activity by comparing multiple Restore Points found in the Windows XP operating system. The registry copies represent a snapshot of the state of the system at a certain point in time. Differences between them can reveal user activity from one instant to another. The algorithms for comparing the hives and interpreting the results are of high complexity. We develop an approach that takes into account the nature of the investigation and the characteristics of the hives to reduce the complexity of the comparison and result interpretation processes. The approach concentrates on hives that present higher activity and highlights only those differences that are relevant to the investigation. The approach is implemented as a software tool that is able to compare any set of offline hives and categorise the results according to the user needs. The categorisation of the results, in terms of activity will help the investigator in interpreting the results. In this paper we present a general concept of result categorisation to prove its efficiency on Windows XP, but these can be adapted to any Windows versions including the latest versions.
منابع مشابه
Extraction of User Activity through Comparison of Windows Restore Points
The extraction of past user activity is one of the main goals in the analysis of digital evidence. In this paper we present a methodology for extracting this activity by comparing multiple Restore Points found in the Windows XP operating system. We concentrate on comparing the copies of the registry hives found within these points. The registry copies represent a snapshot in time of the state o...
متن کاملTemporal Analysis of Windows MRU Registry Keys
The Microsoft Windows registry is an important resource in digital forensic investigations. It contains information about operating system configuration, installed software and user activity. Several researchers have focused on the forensic analysis of the Windows registry, but a robust method for associating past events with registry data values extracted from Windows restore points is not yet...
متن کاملAutomatic Term Identification by User Profile for Document Categorisation in Medline
We show how term extraction methods such as AMTEX and MMTX can be used for the automatic categorisation of medical documents by user profile (novice users and experts). This is achieved by mapping document terms to external lexical resources such as WordNet, and MeSH (the medical thesaurus of NLM).
متن کاملForensic analysis of System Restore points in Microsoft Windows XP
Introduction Investigating computer intrusions can be a complicated matter. Attackers are continually hiding their malicious code, erasing or modifying log files, and finding new techniques to minimize the trace evidence they leave behind. After reviewing nearly 200 compromised systems in the last 12 months, I have often become frustrated with the lack of evidence found on victim systems after ...
متن کاملRobot control system using SMR signals detection
One of the important issues in designing a brain-computer interface system is to select the type of mental activity to be imagined. In some of these systems, mental activity varies with user intent and action that must be controlled by the brain-computer system, and in a number of other signals, the received signals contain the same activity-related mental activity that should be performed by t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JDFSL
دوره 3 شماره
صفحات -
تاریخ انتشار 2008